You've heard about two-tier ERP plans where you relegate
your installed SAP and Oracle systems to plumbing as divisions are launched on
cloud systems that connect to on-premise systems. That approach, popularized by
NetSuite, is beginning to be mimicked with business intelligence on-premise
systems.

It doesn't take a renegade to see why a two-tier business
intelligence (BI) plan may make sense. Consider the following:

Business analysts are increasingly coming to IT for
reporting on the business.

IT has to pull from clunky BI systems and data warehouses
for information.

The information isn't real-time.

And culling that data isn't self service since BI has been
the realm of the chosen few analysts who know the systems.

Meanwhile, the IT department has quietly been taking control of the
situation as IT and application performance monitoring systems add
visualization capabilities and easier to use interfaces. Consider:

AppDynamics, which has a $100 million booking run rate,
launched transaction analytics and a platform that goes beyond application
intelligence to business analytics.

New Relic also launched a business analytics platform and
noted that the answers to your key business questions are in your software already.

I think one of the reasons is that Tableau's market
proposition to customers is a way of doing business intelligence work, analytic
work, and executive dashboarding in a framework that is much more agile, easier
to use and more self service. IT departments are increasingly championing this
as the style they want to roll forward with. Because too often IT departments
have, in essence, become a report factory for the rest of the company.

Splunk, which started being used as an IT log file
monitoring system, is being used for business purposes. The company also has
improved its visualization tools on its platform.

Big data is forcing traditional approaches to data
warehousing and analytics to be rethought.

The upshot here is that new applications demand new
intelligence systems. Traditional business intelligence may not be able to keep
up. In other words, you may want to start testing out IT and application
monitoring systems as quasi BI tools. These analytics' silos won't last for long.
It's time to start pondering next steps and evaluating options beyond what you
already have installed.

Follow

Topics

More From Tech Pro Research

Kubernetes enables the deployment, scaling, and management of containerized applications. This ebook explains why the ecosystem matters, ways to take advantage of it, and how it may contribute to the ...

As more and more employees request the opportunity to perform some or all of their work from a remote location, the need has grown for organizations to have clearly defined guidelines that govern empl...

Finding the best data analytics software, services, and tools for your business requires extended research and a systematic evaluation of features. This download includes an overview of factors to con...

Design flaws in modern chip design have emerged as a significant threat to the security of data on PCs and mobile devices. This comprehensive ebook delves into two prominent vulnerabilities—Spectre an...

Selecting the right VPN provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart rounds up 15 of the top contenders a...

5G: The next-generation wireless network is finally a reality, and businesses remain eager to embrace this new technology. 5G will be popularized via telecom carriers and the marketing of wire-cutting...

The Internet of Things is delivering data and helpful insights to organizations around the world--but it has also introduced new and potentially devastating vulnerabilities. This ebook offers a compre...

Employees, data, and resources are three of the biggest assets in any organization. All employees should be familiar with the processes for recovering information if it becomes lost, inaccessible, or ...

Choosing a CRM solution requires strategy, thoughtful consideration, and more than a little research. These guidelines and comparison tool provide a customizable framework your business can use to fin...

This pre-packaged presentation contains everything you need to get end users up-to-speed fast about how to use Microsoft PowerPoint -- even if you don't consider yourself a public speaker. It includes...

Numerous studies indicate that personal e-mail use at work is a leading cause of lost productivity. In addition, personal e-mail use can introduce viruses and Trojan programs that aid hackers' attempt...

The organization is subject to data retention requirements resulting from a mix of legal, industry, and business mandates. These data retention requirements govern the storage of the organization's in...

This pre-packaged presentation contains everything you need to instruct end users about how to get the most out of Microsoft Access--even if you don't consider yourself a public speaker. It includes a...

Your organization is subject to a mix of strict legal, ethical, and self-imposed mandates that protect all of the organization's information, records, and data from improper, inappropriate, illegal, a...

This policy provides guidelines for the regulated and secure usage of portable storage devices. Its goal is to protect the organization and its employees from internal and external threats and to prov...

This pre-packaged presentation contains everything you need to instruct end users about how to the most out of the Internet and Internet Explorer--even if you don't consider yourself a public speaker...

Computer games--including those installed from floppy disks, USB "thumb" drives, CDs, DVDs, or accessed online or as part of any massive, multiplayer network--present numerous risks to an organization...

The Harness the Full Power of Windows XP presentation is a prepackaged solution for basic Windows XP training. This pre-packaged presentation contains everything you need to instruct end users about h...

This pre-packaged presentation contains everything you need to get end users up-to-speed fast about how to use Microsoft PowerPoint -- even if you don't consider yourself a public speaker. It includes...

Numerous studies indicate that personal e-mail use at work is a leading cause of lost productivity. In addition, personal e-mail use can introduce viruses and Trojan programs that aid hackers' attempt...

The organization is subject to data retention requirements resulting from a mix of legal, industry, and business mandates. These data retention requirements govern the storage of the organization's in...

This pre-packaged presentation contains everything you need to instruct end users about how to get the most out of Microsoft Access--even if you don't consider yourself a public speaker. It includes a...

Your organization is subject to a mix of strict legal, ethical, and self-imposed mandates that protect all of the organization's information, records, and data from improper, inappropriate, illegal, a...

This policy provides guidelines for the regulated and secure usage of portable storage devices. Its goal is to protect the organization and its employees from internal and external threats and to prov...

This pre-packaged presentation contains everything you need to instruct end users about how to the most out of the Internet and Internet Explorer--even if you don't consider yourself a public speaker...

Computer games--including those installed from floppy disks, USB "thumb" drives, CDs, DVDs, or accessed online or as part of any massive, multiplayer network--present numerous risks to an organization...

The Harness the Full Power of Windows XP presentation is a prepackaged solution for basic Windows XP training. This pre-packaged presentation contains everything you need to instruct end users about h...